A covert queueing channel in fcfs schedulers

AE Ghassami, N Kiyavash - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
We study covert queueing channels (CQCs), which are a kind of covert timing channel that
may be exploited in shared queues across supposedly isolated users. In our system model …

A covert queueing channel in round robin schedulers

AE Ghassami, A Yekkehkhany, N Kiyavash - arXiv preprint arXiv …, 2017 - arxiv.org
We study a covert queueing channel (CQC) between two users sharing a round robin
scheduler. Such a covert channel can arise when users share a resource such as a …

Capacity limit of queueing timing channel in shared FCFS schedulers

AE Ghassami, X Gong… - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
The capacity of a queueing timing channel in which a user modulates messages to another
user via his pattern of access to a shared resource scheduled in an FCFS manner is …

Covert bits through queues

P Mukherjee, S Ulukus - 2016 IEEE Conference on …, 2016 - ieeexplore.ieee.org
We consider covert communication using a queuing timing channel in the presence of a
warden. The covert message is encoded using the inter-arrival times of the packets, and the …

Capacity estimation and auditability of network covert channels

BR Venkatraman… - Proceedings 1995 IEEE …, 1995 - ieeexplore.ieee.org
Classical covert channel analysis has focused on channels available on a single computer:
timing channels and storage channels. We characterize network covert channels. Potential …

Design and performance evaluation of a covert timing channel

R Archibald, D Ghosal - Security and Communication Networks, 2016 - Wiley Online Library
In a model‐based covert timing channel (CTC), the (covert) sender modulates the inter‐
packet delays (IPDs) of the packet stream generated by the overt application (source) by …

Information theoretic analysis of side channel information leakage in FCFS schedulers

X Gong, N Kiyavash… - 2011 IEEE International …, 2011 - ieeexplore.ieee.org
The information leakage of a queuing side channel in two-user-shared scheduling system is
studied from an information theoretic perspective. In the queueing side channel, a malicious …

Sneak-peek: High speed covert channels in data center networks

R Tahir, MT Khan, X Gong, A Ahmed… - … INFOCOM 2016-The …, 2016 - ieeexplore.ieee.org
With the advent of big data, modern businesses face an increasing need to store and
process large volumes of sensitive customer information on the cloud. In these …

[PDF][PDF] Modeling, analysis, and detection of information leakage via protocol-based covert channels

J Jaskolka - 2010 - researchgate.net
With the emergence of computers in every day activities and with the ever-growing
complexity of networks and network protocols, covert channels are becoming an eminent …

Design and analysis of a model-based Covert Timing Channel for Skype traffic

R Archibald, D Ghosal - 2015 IEEE Conference on …, 2015 - ieeexplore.ieee.org
In a model-based Covert Timing Channel (CTC), the (covert) sender modulates the inter-
packet delays (IPDs) of the packet stream generated by the overt application (source) by …